General

  • Target

    e4e65b81d89c70ac3adb561ea6536b86544b0838a6e12baf1dadfb969d929b95.exe

  • Size

    1.4MB

  • Sample

    240820-v2wmtavbjg

  • MD5

    8fedf5854abcc5c9349c76f3e1fb9151

  • SHA1

    6cfc2e112133cc8e455fadae1503d506c65d1f40

  • SHA256

    e4e65b81d89c70ac3adb561ea6536b86544b0838a6e12baf1dadfb969d929b95

  • SHA512

    70cddf941ce1f13ba7f0e76c54530d6c1e2f572998019302cbc500b1be550367f9b7ba793410f61ca0b077c9544ee8e904b5a0582b403bfdc53f3dc0bab9ae39

  • SSDEEP

    24576:2qDEvCTbMWu7rQYlBQcBiT6rprG8aSa1ObT/e0fvr+K3P2Sn1qRLq/SmL:2TvC/MTQYxsWR7af1KVfvr+K3+SnkBy

Malware Config

Targets

    • Target

      e4e65b81d89c70ac3adb561ea6536b86544b0838a6e12baf1dadfb969d929b95.exe

    • Size

      1.4MB

    • MD5

      8fedf5854abcc5c9349c76f3e1fb9151

    • SHA1

      6cfc2e112133cc8e455fadae1503d506c65d1f40

    • SHA256

      e4e65b81d89c70ac3adb561ea6536b86544b0838a6e12baf1dadfb969d929b95

    • SHA512

      70cddf941ce1f13ba7f0e76c54530d6c1e2f572998019302cbc500b1be550367f9b7ba793410f61ca0b077c9544ee8e904b5a0582b403bfdc53f3dc0bab9ae39

    • SSDEEP

      24576:2qDEvCTbMWu7rQYlBQcBiT6rprG8aSa1ObT/e0fvr+K3P2Sn1qRLq/SmL:2TvC/MTQYxsWR7af1KVfvr+K3+SnkBy

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks